![how to use nessus on local network how to use nessus on local network](https://www.ayusyahomehealthcare.com/wp-content/uploads/2020/07/ghee-butter-in-glass-jar-with-wooden-spoon-e1595913450622.jpg)
- #How to use nessus on local network how to
- #How to use nessus on local network Patch
- #How to use nessus on local network upgrade
- #How to use nessus on local network series
- #How to use nessus on local network windows
#How to use nessus on local network upgrade
I wouldn’t recommend this type of activity since one can end up assuming too much issues but this can be helpful when an upgrade of the environment is already on the works and there will be a date when these boxes are no longer under production. This way this assumed risks won’t appear again the results. Identify all the hosts with that sort of issue, search for the ‘offending’ plugin, place an expiration date (typically after these boxes are decomissioned) and just place ‘Hide this result’ configuration. Nessus does even include rules for plugins and in this case the action would be pretty simple. This can be an issue but in some environments one just has to run with it. However there are cases where the systems have been configured supporting old SSL cypher suites since the applications running or interacting with the systems do not support modern ones.
![how to use nessus on local network how to use nessus on local network](https://linuxhint.com/wp-content/uploads/2018/02/n14.png)
Setting exceptions for assumed (unresolvable) issues On outdated systems one can typically solve most of the more relevant issues (and the rest of many CVEs) just by patching. The issues are not just detected, evaluated with the CVSS3 scale, identified with the correspondent CVE number but an explanation is also included and more importantly some sort of solution as well. These are: ‘Synopsis’, ‘Description’ and ‘Solution’. Very interestingly the CVS file can include, and I’d recommend doing so, three columns a security analyst, pentester or auditor may find helpful.
#How to use nessus on local network Patch
For example if one wishes to just patch vulnerabilities from a certain level to the top, say just ‘high’ and ‘critical’ rated (beyond 7.0 in the CVSS3 scale), one selects those only and the scope is dramatically reduced.
![how to use nessus on local network how to use nessus on local network](https://adamtheautomator.com/wp-content/uploads/2021/02/Untitled-2021-02-20T134734.285.png)
When opening that file one can be overwhelmed but mind you can select what you can act on. I have converted it to Excel format so you do not need to fight with converting it or similar. Mine resulted as this attached Windows_2K8_R2_vulns file.
#How to use nessus on local network series
If the CSV option is selected a dialog pops up and a series of options are displayed so the report can be customizable. The options for reports are CSV file and html. So reports can be easier to handle for scale. Although the UI is very easy to use and quite explanatory of the issues found on systems, once the scan includes lots of issues and just more than one box, losing track is very easy.
![how to use nessus on local network how to use nessus on local network](https://www.slashadmin.co.uk/wp-content/uploads/2020/11/How-to-Setup-Windows-For-a-Nessus-Credentialed-Patch-Scan-2.jpg)
Which can be more convenient for auditing purposes on medium sized to large environments. One can use the UI to check the vulnerabilities and details but on the right corner of the screen there is a ‘Report’ button. If we check the critical ones we’ll see this:Īnd if we get into one specific we’ll get this view:Īll sort of nice details appear on the UI, from the original description from the vendor, the original advisory URL and some references from others, to a very well detailed risk information on the right. It’s not just outdated but out of support since January 14th this year (if you haven’t noticed you are in trouble).Īs seen on the very top picture among of all the types of issues found in this example scan, the first 320 ones are related to missing updates.
#How to use nessus on local network windows
This is the view after scanning an outdated Windows 2008 R2 server.
#How to use nessus on local network how to
If you find the articles in useful to you, please consider making a donation.īut this article is a how to work with Nessus scan results, so I have already scanned two boxes, which were massively outdated on purpose so I could collect lots of output and deal with a few bits of it for the sake of demonstration. Even SCADA systems have a plugin to be scanned with. Different UNIX or Linux systems scans? Yes, those too. Different services like DNS, FTP, SNMP, SMTP? Yes. So we can check from Windows vulnerabilities, to web server configurations, through networking gear assessments for F5 or Cisco equipment. As I showed in the introduction article about Nessus, there are three dedicated plugins to Windows, and the bigger one scans for more than 4500 items. Nessus is a powerful tool and has some niceties, even in the community edition where one can scan lots of different types of systems with the help of plugins. How do I know that? Because I’ve worked with this tool for some time and although I do not know every corner of the things I’ve been doing some scans and solving quite a few deffects on systems that were labeled as ‘production ready’ when they clearly weren’t. Working with Nessus scan results is easy.